Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 43,45
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GuthrieBooks, Spring Branch, TX, Estados Unidos de America
EUR 45,33
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 53,69
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 59,56
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 56,53
Cantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 59,45
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 78,02
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. pp. 528.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 66,06
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
EUR 85,53
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. pp. xi + 378 1st Edition.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 81,15
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 2013 edition. 512 pages. 9.00x6.25x1.25 inches. In Stock.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 83,52
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Brand New. revised edition. 390 pages. 9.00x6.00x0.75 inches. In Stock.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Librería: moluna, Greven, Alemania
EUR 48,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.
Librería: preigu, Osnabrück, Alemania
EUR 50,25
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Information Security Applications | 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers | Jooseok Song (u. a.) | Taschenbuch | xii | Englisch | 2006 | Springer | EAN 9783540310129 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Librería: preigu, Osnabrück, Alemania
EUR 50,35
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Information Security and Cryptology -- ICISC 2012 | 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers | Taekyoung Kwon (u. a.) | Taschenbuch | xiv | Englisch | 2013 | Springer | EAN 9783642376818 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 46,22
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, Springer Berlin Heidelberg Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22 24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ve special talks. Moti Yung gave a tutorial talk, entitled Malware Meets Cryptography. Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled On the Evolution of Adversary Models in Security Protocols and Public- Key Encryption with Keyword Search, respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation and A New Booming Era of DRM: Applications and Extending Business, respectively. 392 pp. Englisch.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg Apr 2013, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement. 528 pp. Englisch.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 75,63
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND pp. 528.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 81,64
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand pp. 528 108 Illus.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 87,32
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand pp. xi + 378 Illus.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 83,78
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND pp. xi + 378.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Librería: moluna, Greven, Alemania
EUR 48,37
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. State-of-the-art research Fast-track conference proceedings Unique visibilityThis book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICIS.
Idioma: Inglés
Publicado por Springer, Springer Apr 2013, 2013
ISBN 10: 3642376819 ISBN 13: 9783642376818
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -InhaltsangabeAttack and defense.- Software and Web security.- Cryptanalysis.- Cryptographic protocol.- Identity-based encryption.- Efficient implementation.- Cloud computing security.- Side channel analysis.- Digital signature.- Privacy enhancement.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 528 pp. Englisch.
Idioma: Inglés
Publicado por Springer, Springer Feb 2006, 2006
ISBN 10: 3540310126 ISBN 13: 9783540310129
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Security Analysis and Attacks.- Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes.- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis.- System Security.- An Alert Data Mining Framework for Network-Based Intrusion Detection System.- Key Factors Influencing Worm Infection in Enterprise Networks.- Evaluation of the Unified Modeling Language for Security Requirements Analysis.- Network Security.- A Simple and Efficient Conference Scheme for Mobile Communications.- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model.- Elastic Security QoS Provisioning for Telematics Applications.- DRM/Software Security.- An Improved Algorithm to Watermark Numeric Relational Data.- Video Fingerprinting System Using Wavelet and Error Correcting Code.- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.- Kimchi: A Binary Rewriting Defense Against Format String Attacks.- Software Protection Through Dynamic Code Mutation.- Efficient HW Implementation.- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ).- Developing and Implementing IHPM on IXP 425 Network Processor Platforms.- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.- Side-Channel Attacks.- Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.- A DPA Countermeasure by Randomized Frobenius Decomposition.- DPA Attack on the Improved Ha-Moon Algorithm.- An Efficient Masking Scheme for AES SoftwareImplementations.- Privacy/Anonymity.- Secure Multi-attribute Procurement Auction.- Oblivious Conjunctive Keyword Search.- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption.- Efficient Implementation.- New Concept of Authority Range for Flexible Management of Role Hierarchy.- Role-Based Access Control Model for Ubiquitous Computing Environment.- Designing Security Auditing Protocol with Web Browsers.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 392 pp. Englisch.